clouds created HDFS-6845: ---------------------------- Summary: XSS and or content injection in hdfs Key: HDFS-6845 URL: https://issues.apache.org/jira/browse/HDFS-6845 Project: Hadoop HDFS Issue Type: Bug Affects Versions: 2.4.1 Reporter: clouds
Following up from email "... I was auditing the latest stable version of hdfs - 2.4.1 (as made available from http://mirror.nexcess.net/apache/hadoop/common/hadoop-2.4.1/hadoop-2.4.1-src.tar.gz ), I noticed an interesting XSS filter. Ok, sure. But what intrigued me was where I didn't find any attempt to validate or sanitize. Within DatanodeJSPHelper.java - line 108, nnAddr is assigned the value from the raw parameter NAMENODE_ADDRESS. On line 120, printgotoform is called with the raw value. Then then called JspHelper.java's printGotoForm method - Line 452. Then on line 468, the unvalidated or sanitized value is printed to the html page. Worst case, reflected XSS. Better case, content injection. Similarily, DatanodeJSPHelper.java's line 102 tokenString variable looks plausible but I am not certain if an incorrect token will cause the business logic to fail before the malicious input it displayed (JspHelper.java - line 465.) ..." These are not the only XSS / Content injection points but should give an easy idea to find the others. -- This message was sent by Atlassian JIRA (v6.2#6252)